2019
DOI: 10.1049/iet-com.2018.5749
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer authentication scheme with channel based tag padding sequence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…Lin et al [25] worked on optimizing the spectral efficiency of mobile users by authenticating each user's CSI. Additionally, notions of channelbased physical-layer authentication and feature selection in abnormal detection can be extended to enhance security in D2D clustering problems [26], [27].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Lin et al [25] worked on optimizing the spectral efficiency of mobile users by authenticating each user's CSI. Additionally, notions of channelbased physical-layer authentication and feature selection in abnormal detection can be extended to enhance security in D2D clustering problems [26], [27].…”
Section: Related Workmentioning
confidence: 99%
“…When the attacker does not forge the CSI feedback (i.e., 'No CSI forgery'), the clustering failure probability is 1 N = 0.2 since the attacker only has the chance of being selected as the CH equally with the other normal users. When we consider the defense mechanism with the proposed β value in (27), we can achieve the low clustering failure probability for various α values. However, we should carefully set the β value as the inappropriate β value (e.g., β = 5.0) will not ensure the effectiveness of the defense mechanism.…”
Section: A Impact Of the Clustering Failure Attackmentioning
confidence: 99%
See 3 more Smart Citations